III
Table of Contents
Foreword .................................................................................................................................................... I
Important Safeguards and Warnings ..................................................................................................... II
1 Initialization ............................................................................................................................................ 1
2 Login Interface ....................................................................................................................................... 2
Login .............................................................................................................................................. 2 2.1 Resetting Password ...................................................................................................................... 2 2.2
3 Main Interface ........................................................................................................................................ 4
4 Local Setting .......................................................................................................................................... 5
Basic .............................................................................................................................................. 5 4.1 4.1.1 Device Properties & Events ................................................................................................ 5
4.1.2 Façade Layout (Only for VTO3211D) ................................................................................. 6
Video & Audio ................................................................................................................................ 7 4.2 Access Control .............................................................................................................................. 9 4.3 4.3.1 Local ................................................................................................................................... 9
4.3.2 RS-485 .............................................................................................................................. 10
System ........................................................................................................................................ 10 4.4 Security ........................................................................................................................................ 11 4.5 Onvif User ................................................................................................................................... 12 4.6
5 Household Setting ............................................................................................................................... 13
VTO No. Management ................................................................................................................ 13 5.1 5.1.1 Adding VTO ....................................................................................................................... 13
5.1.2 Modifying VTO Information ............................................................................................... 14
5.1.3 Deleting VTO .................................................................................................................... 15
Room No. Management .............................................................................................................. 15 5.2 5.2.1 Adding Room Number ...................................................................................................... 15
5.2.2 Modifying Room Number .................................................................................................. 17
5.2.3 Issuing Access Card ......................................................................................................... 17
VTS Management ....................................................................................................................... 18 5.3 Status .......................................................................................................................................... 19 5.4
6 Network Setting ................................................................................................................................... 20
Basic ............................................................................................................................................ 20 6.1 6.1.1 TCP/IP .............................................................................................................................. 20
6.1.2 Port ................................................................................................................................... 20
6.1.3 HTTPS .............................................................................................................................. 21
6.1.4 P2P ................................................................................................................................... 21
SIP Server ................................................................................................................................... 21 6.2 Firewall ........................................................................................................................................ 22 6.3
7 Log Management ................................................................................................................................. 24
Call .............................................................................................................................................. 24 7.1 Alarm ........................................................................................................................................... 24 7.2 Unlock ......................................................................................................................................... 24 7.3 Log .............................................................................................................................................. 25 7.4 Cybersecurity Recommendations ................................................................................... 26 Appendix 1